813 resultados para wireless networks user-centric networking
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
Background: Fashion is a dynamic and creative industry where larger retailers are enjoying international success. Small businesses however are struggling in the face of international expansion, as they lack the necessary resources and managerial know-how. The Finnish fashion industry has neither been able to develop the industry environment to support small and micro firms nor has Finland relevant finance or public domains, such as, seen in other Nordic countries. Networking has been recognized to facilitate organizational growth and international expansion in industries such as manufacturing and high technology. It has enabled smaller companies to gain resources, knowledge and experiences otherwise unattainable. Objective: The purpose of this study was to explore how networking has been utilized in the Finnish fashion industry. Particularly social relationships and networks are examined, as they emphasize the importance of individuals. Exploration on the past actions should also provide insight how networks and networking could be utilized and developed in the future. Main findings: It was discovered that the Finnish fashion industry (social) network is rather dense. This was mainly due to the small size of the Finnish market. In the early years of the establishment of the company, close contacts seemed to be utilized. As a company expands and extends its business, the relationships tended to move towards more utilitarian in nature. However, in some cases, the long term relationships had also affectionate features, such as trust and commitment. International networking was found to have positive impact on business opportunities. Participation to events, such as trade shows, was perceived as one of the best ways to meet new international contacts and to develop ones network. Active networking in the Finnish market, however, created both domestic and international opportunities. Furthermore, cooperation and open communication were discovered to facilitate innovation and projects. The public sector seemed to lack the interest in supporting the fashion industry according to the interviewees. The major issues for the fashion industry still concerned, among others, funding, administrative guidance and public support for developing the industry as a whole.
Resumo:
Langattomat lähiverkot ovat yleistyneet ja monin paikoin niillä pyritään täysin korvaamaan perinteiset kaapeloidut verkot. Samalla verkoissa välitettävät palvelut monipuolistuvat. Etenkin interaktiivisten sisältöjen ja viiveriippuvaisten palvelujen välittämisessä korostuvat verkolle asettavat vaatimukset suorituskyvystä ja palveluntasosta. Radiotaajuuksilla tapahtuva tiedonsiirto on ongelmallista siirtomedian jaetun luonteen vuoksi. Käytettäessä ympärisäteileviä antenneja jokainen kantomatkan päässä oleva asema kuulee lähetyksen, vaikkei se olisi sille suunnattu. Tämä luo turvallisuusongelman, mutta lisäksi heikentää tehokkuutta, koska nykyisellä antenniteknologialla vain yksi asema kerrallaan voi lähettää häiriöttä kantoalueellaan. Täsmälähetykset yhden lähteen ja useiden kohteiden välillä luovat erillisiä siirtolinkkejä. Olisi luontevampaa luoda yksi lähetysvirta, johon useat vastaanottajat voivat kytkeytyä. Kaistan säästön vastapainona on tarve luoda ja ylläpitää näitä yhteyksiä. Käyttäjien liikkuvuuden ja siirtotien vaihtelevien ominaisuuksien vuoksi langattoman verkon rakenne ja rajat ovat epäselviä. Näihin haasteisiin on vastattava sekä protokolla- että sovellustasolla. Tässä tutkielmassa käydään ensin läpi IEEE 802.11 -standardin mukaisen langattoman verkon perusteet ja sen ominaisuuksiin liittyvät tyypilliset ongelmakohdat. Yleis- ja ryhmälähetyksiä tarkastellaan ensin perinteisessä IEEE 802.3 standardin mukaisessa langallisessa lähiverkossa ja selvitetään, miten vastaavat ominaisuudet toteutuvat IEEE 802.11 standardien mukaisissa langattomissa verkoissa. Käyttötapaustutkimuksissa keskitytään rajatussa ympäristössä tapahtuviin ryhmälähetyksiin. Erityisesti tutkitaan langattomien ryhmälähetysten käyttökelpoisuutta sekä langattoman ympäristön asettamia erityisvaatimuksia.
Resumo:
The proliferation of wireless sensor networks in a large spectrum of applications had been spurered by the rapid advances in MEMS(micro-electro mechanical systems )based sensor technology coupled with low power,Low cost digital signal processors and radio frequency circuits.A sensor network is composed of thousands of low cost and portable devices bearing large sensing computing and wireless communication capabilities. This large collection of tiny sensors can form a robust data computing and communication distributed system for automated information gathering and distributed sensing.The main attractive feature is that such a sensor network can be deployed in remote areas.Since the sensor node is battery powered,all the sensor nodes should collaborate together to form a fault tolerant network so as toprovide an efficient utilization of precious network resources like wireless channel,memory and battery capacity.The most crucial constraint is the energy consumption which has become the prime challenge for the design of long lived sensor nodes.
Resumo:
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production.This paper describes the application of wireless sensor network for crop monitoring in the paddy fields of kuttand, a region of Kerala, the southern state of India.
Resumo:
In Wireless Sensor Networks (WSN), neglecting the effects of varying channel quality can lead to an unnecessary wastage of precious battery resources and in turn can result in the rapid depletion of sensor energy and the partitioning of the network. Fairness is a critical issue when accessing a shared wireless channel and fair scheduling must be employed to provide the proper flow of information in a WSN. In this paper, we develop a channel adaptive MAC protocol with a traffic-aware dynamic power management algorithm for efficient packet scheduling and queuing in a sensor network, with time varying characteristics of the wireless channel also taken into consideration. The proposed protocol calculates a combined weight value based on the channel state and link quality. Then transmission is allowed only for those nodes with weights greater than a minimum quality threshold and nodes attempting to access the wireless medium with a low weight will be allowed to transmit only when their weight becomes high. This results in many poor quality nodes being deprived of transmission for a considerable amount of time. To avoid the buffer overflow and to achieve fairness for the poor quality nodes, we design a Load prediction algorithm. We also design a traffic aware dynamic power management scheme to minimize the energy consumption by continuously turning off the radio interface of all the unnecessary nodes that are not included in the routing path. By Simulation results, we show that our proposed protocol achieves a higher throughput and fairness besides reducing the delay
Resumo:
Data caching is an attractive solution for reducing bandwidth demands and network latency in mobile ad hoc networks. Deploying caches in mobile nodes can reduce the overall traf c considerably. Cache hits eliminate the need to contact the data source frequently, which avoids additional network overhead. In this paper we propose a data discovery and cache management policy for cooperative caching, which reduces the power usage, caching overhead and delay by reducing the number of control messages flooded into the network .A cache discovery process based on position cordinates of neighboring nodes is developed for this .The stimulstion results gives a promising result based on the metrics of the studies.
Resumo:
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production. This paper describes the security issues related to wireless sensor networks and suggests some techniques for achieving system security. This paper also discusses a protocol that can be adopted for increasing the security of the transmitted data
Resumo:
Current Trends in Wireless Networking. DigitalLibrary@CUSAT. ...
Resumo:
Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.
Resumo:
This paper provides an introduction to Wireless Sensor Networks (WSN), their applications in the field of control engineering and elsewhere and gives pointers to future research needs. WSN are collections of stand-alone devices which, typically, have one or more sensors (e.g. temperature, light level), some limited processing capability and a wireless interface allowing communication with a base station. As they are usually battery powered, the biggest challenge is to achieve the necessary monitoring whilst using the least amount of power.
Resumo:
Wireless sensor networks (WSNs) have been widely used in pervasive systems such as intelligent buildings. As a vital factor of product cost, energy consuming in WSN has been focused upon, but only via energy harvesting can the problem be overcome radically. This article presents a new approach to harvesting electromagnetic energy for WSN from useless radio frequency (RF) signals transmitted in WSN, with a quantitative analysis showing its feasibility.
Resumo:
In this paper we propose an enhanced relay-enabled distributed coordination function (rDCF) for wireless ad hoc networks. The idea of rDCF is to use high data rate nodes to work as relays for the low data rate nodes. The relay helps to increase the throughput and lower overall blocking time of nodes due to faster dual-hop transmission. rDCF achieves higher throughput over IEEE 802.11 distributed coordination function (DCF). The protocol is further enhanced for higher throughput and reduced energy. These enhancements result from the use of a dynamic preamble (i.e. using short preamble for the relay transmission) and also by reducing unnecessary overhearing (by other nodes not involved in transmission). We have modeled the energy consumption of rDCF, showing that rDCF provides an energy efficiency of 21.7% at 50 nodes over 802.11 DCF. Compared with the existing rDCF, the enhanced rDCF (ErDCF) scheme proposed in this paper yields a throughput improvement of 16.54% (at the packet length of 1000 bytes) and an energy saving of 53% at 50 nodes.